Pre-loaded With Certificate Patents (Class 713/173)
  • Publication number: 20080008316
    Abstract: A system and method for enterprise security including symmetric key protection. In accordance with an embodiment, the system provides a higher level of protection against unauthorized key disclosure by encrypting randomly generated seed data used for key generation, and using digital signatures and asymmetric encryption.
    Type: Application
    Filed: July 5, 2006
    Publication date: January 10, 2008
    Applicant: BEA SYSTEMS, INC.
    Inventor: Denis Pilipchuk
  • Publication number: 20080010455
    Abstract: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by using the private key to sign data provided to it or signals derived from the data. An identity object may be stored in a non-volatile memory as proof of identity, where the memory is controlled by a controller. Preferably, a housing encloses the memory and the controller. In another embodiment, an identity object may be stored in a non-volatile memory of a memory system as proof of identity. The memory system is removably connected to a host device. After the host device has been successfully authenticated, the private key of the object is used to encrypt data from the host device or signals derived from said data, and the at least one certificate and the encrypted data or signals are sent to the host device.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Patent number: 7313701
    Abstract: The invention provides for robust efficient distributed generation of RSA keys. An efficient protocol is one which is independent of the primality test “circuit size”, while a robust protocol allows correct completion even in the presence of a minority of arbitrarily misbehaving malicious parties. The disclosed protocol is secure against any minority of malicious parties (which is optimal). The disclosed method is useful in establishing sensitive distributed cryptographic function sharing services (certification authorities, signature schemes with distributed trust, and key escrow authorities), as well as other applications besides RSA (namely: composite ElGamal, identification schemes, simultaneous bit exchange, etc.). The disclosed method can be combined with proactive function sharing techniques to establish the first efficient, optimal-resilience, robust and proactively-secure RSA-based distributed trust services where the key is never entrusted to a single entity (i.e.
    Type: Grant
    Filed: May 21, 2001
    Date of Patent: December 25, 2007
    Assignee: CQR Cert, LLC
    Inventors: Yair Frankel, Marcel M. Yung, Philip D. MacKenzie
  • Patent number: 7310706
    Abstract: A microprocessor includes random cache line refill ordering to lessen side channel leakage in a cache line and thus thwart cryptanalysis attacks such as timing attacks, power analysis attacks, and probe attacks. A random sequence generator is used to randomize the order in which memory locations are read when filling a cache line.
    Type: Grant
    Filed: May 10, 2002
    Date of Patent: December 18, 2007
    Assignee: MIPS Technologies, Inc.
    Inventors: Morten Stribaek, Jakob Schou Jensen, Jean-Francois Dhem
  • Publication number: 20070283143
    Abstract: A system and method for certificate-based client registration via a document processing device is provided. A client device, having an operating system disparate from a document processing device on a computer network, connects to the document processing device to procure a valid digital certificate. The document processing device receives authentication data from the client device, which is then verified by a trusted authentication server. The document processing device, based upon the verification by the authentication server, authenticates the certificate request made by the client device. The document processing device then forwards the authenticated certificate request to a trusted certificate server for issuance of a digital certificate. The certificate server issues the digital certificate, which is then returned to the document processing device.
    Type: Application
    Filed: June 6, 2006
    Publication date: December 6, 2007
    Inventors: Sameer Yami, Amir Shahindoust
  • Publication number: 20070283157
    Abstract: A system and method for enabling secure communications from a shared multifunction peripheral device is provided. The shared multifunction peripheral device first receives identification data representative of an associated user requesting a document processing operation. Upon authentication of the user, a key pair is generated by the shared multifunction peripheral device. The shared multifunction peripheral device also generates a limited operation certificate, restricting the user to a particular function offered by the shared multifunction peripheral device. The certificate is then stored by the shared multifunction peripheral device and the private key is encrypted using the received identification data. The public key and encrypted private key are then stored by the shared multifunction peripheral device. An electronic mail message is then generated by the shared multifunction peripheral device and digitally signed using the private key, whereupon it is transmitted to one or more designated recipients.
    Type: Application
    Filed: June 5, 2006
    Publication date: December 6, 2007
    Inventors: Sameer Yami, Amir Shahindoust
  • Patent number: 7305550
    Abstract: A system and method for facilitating authentication or identification services including an authentication server configured to provide an authentication certificate to a user of a first client device for authentication or identification of a user of a second client device. The first and second client devices are configured to communicate with each other and the authentication server. Each of the first and second client devices includes a user control program configured to communicate data to and from the authentication server. A media gateway is coupled to the authentication server to enable communication of media data from the first and second client devices to the authentication server. The user control program of the first client device is configured to receive a certificate corresponding to the user of the second client device and the authentication certificate from the authentication server.
    Type: Grant
    Filed: December 29, 2000
    Date of Patent: December 4, 2007
    Assignee: Intel Corporation
    Inventors: Neal C. Oliver, Michael A. Yudkowsky
  • Patent number: 7302703
    Abstract: Intelligent hardware token processors (5) are capable of sending and receiving encrypted messages. Generic initialization with non-user-specific certificates comprising public and private keys allows a certificate authority (210) to securely communicate with the hardware token. New users enrolling with the certificate server (210) have their hardware tokens securely reprogrammed with user specific certificates.
    Type: Grant
    Filed: December 20, 2000
    Date of Patent: November 27, 2007
    Assignee: AOL, LLC a Delaware limited liability company
    Inventor: William Burns
  • Patent number: 7287159
    Abstract: Software is identified while in main memory by examining small portions of its executable image or by examining the results of its execution. These portions, or an encoding of them, are then compared with previously stored identifying information about at least one Software through an approximate matching process.
    Type: Grant
    Filed: April 1, 2004
    Date of Patent: October 23, 2007
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram, Timir Karia, David Molnar, Yossi Beinart
  • Patent number: 7281132
    Abstract: The present invention provides for token based signing of an unsigned binary which may be a stream of bits (e.g., 0's and 1's). The unsigned binary is signed using a secret key which resides in a token (e.g., a smart card), which makes the secret key available to the token holder. The unsigned binary is downloaded and verified for authenticity by the token coupled to a computing device. In one embodiment, the downloaded unsigned binary is encrypted. If the unsigned binary is authentic, it may be used to replace the prior firmware on that computing device.
    Type: Grant
    Filed: October 19, 2001
    Date of Patent: October 9, 2007
    Assignee: Sun Microsystems, Inc.
    Inventors: Michael S. Bender, Benjamin H. Stoltz
  • Publication number: 20070234055
    Abstract: There is provided a communication system in which a network device and an information processing device are communicatably connected to each other through a network. The network device comprises a certificate providing unit to transmit an electronic certificate to the information processing device through the network; and a printing unit configured to print an image of a public key corresponding to the electronic certificate. The information processing device comprises: a certificate reception unit to receive the electronic certificate from the certificate providing unit through the network; an image output unit to generate and output an image of the public key described in the received electronic certificate; and an installation unit configured to install the electronic certificate onto the information processing device in response to a fact that the generated image of the public key is output by the image output unit and a command for installation of an electronic certificate is received.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 4, 2007
    Inventors: Kiyotaka Ohara, Masafumi Miyazawa
  • Publication number: 20070226488
    Abstract: A system for protecting digital files is provided. The system includes at least one client computer and a server connected to the at lease one server. Each client computer includes: a file identifier generating module, for generating a file identifier for a digital file; a key generating module, for generating a key for the digital file; and a data encoding module, for encrypting the digital file according to the key. The server includes an identification validating module for determining whether a user intending to access the digital file has a corresponding access right, according to the user's digital certificate information. A related method is also provided.
    Type: Application
    Filed: December 1, 2006
    Publication date: September 27, 2007
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: BOR-CHUAN LIN, GAO-PENG HU, JIAN HUANG, CAI-YANG LUO
  • Patent number: 7275109
    Abstract: A communication system, for use with a communications network, includes a client configured to communicate with the server via the network. The client includes an input configured to receive a communication from a server via the network, a data set with identifiable portions, and an apparatus coupled to the interface and coupled and configured to select a portion of the data set, the apparatus being further configured to process the selected portion of the data set and a portion of the communication in accordance with an authentication function to produce an authentication result, where the selected portion of the data set is configured to serve a function independent of being used in accordance with the authentication function.
    Type: Grant
    Filed: April 2, 2002
    Date of Patent: September 25, 2007
    Assignee: Nortel Networks Limited
    Inventor: Michael G. Lee
  • Publication number: 20070220258
    Abstract: A credibility computing apparatus calculates credibility of a certificate based on use duration of the certificate. The use duration is a duration from the date of issue of the certificate to the current date.
    Type: Application
    Filed: August 23, 2006
    Publication date: September 20, 2007
    Inventors: Hironobu Kitajima, Ryo Ochitani
  • Patent number: 7272723
    Abstract: A compact, self-contained, personal key is disclosed. The personal key comprises a USB-compliant interface releaseably coupleable to a host processing device; a memory; and a processor. The processor provides the host processing device conditional access to data storable in the memory as well as the functionality required to manage files stored in the personal key and for performing computations based on the data in the files. In one embodiment, the personal key also comprises an integral user input device and an integral user output device. The input and output devices communicate with the processor by communication paths which are independent from the USB-compliant interface, and thus allow the user to communicate with the processor without manifesting any private information external to the personal key.
    Type: Grant
    Filed: November 24, 1999
    Date of Patent: September 18, 2007
    Assignee: SafeNet, Inc.
    Inventors: Shawn D. Abbott, Bahram Afghani, Mehdi Sotoodeh, Norman L. Denton, III, Calvin W. Long
  • Patent number: 7272656
    Abstract: In an address management system, an interface ID can be handed over from one apparatus to another without losing the correspondence between the interface ID and a user. As a result, the interface ID can be used as a unique identifier for the user. Accordingly, an effective infrastructure for individualized services is achieved. The interface ID may be constant for one user even when an apparatus is replaced, and thus IPv6 communication can be used as a user-associated address in high availability services, such as telephone services. Furthermore, the interface ID can be returned and reused, and thus the interface ID can be efficiently used.
    Type: Grant
    Filed: August 7, 2002
    Date of Patent: September 18, 2007
    Assignee: Sony Corporation
    Inventor: Yutaka Miyoshi
  • Patent number: 7269844
    Abstract: A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.
    Type: Grant
    Filed: July 3, 2001
    Date of Patent: September 11, 2007
    Assignee: SafeNet, Inc.
    Inventors: Laszlo Elteto, Shawn D. Abbott, James Khalaf, Reed H. Tibbetts, Mehdi Sotoodeh, Calvin W. Long
  • Patent number: 7257710
    Abstract: The present invention provides an additional-watermark embedding apparatus for embedding predetermined additional data into original data. The additional-watermark embedding apparatus includes an adder for summing the original data and the additional data, a first amplifier for amplifying the original data according to a predetermined non-linear input-output characteristic, a second amplifier for amplifying the summed data supplied from the adder according to a predetermined non-linear input-output characteristic, a subtractor for taking the difference between the amplified data obtained by the second amplifier and the amplified original data obtained by the first amplifier, and an embedder for embedding modified additional data which is obtained by modifying the waveform of the additional data according to the original data and which is supplied from the subtractor into the original data.
    Type: Grant
    Filed: August 19, 2002
    Date of Patent: August 14, 2007
    Assignee: Sony Corporation
    Inventors: Jun Hirai, Yoonki Choi
  • Patent number: 7257708
    Abstract: Various embodiments pertain to steganographically authenticating identities and authorizing transactions based on the authenticated identities.
    Type: Grant
    Filed: August 25, 2005
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventor: Scott B. Guthery
  • Publication number: 20070186110
    Abstract: An information processing apparatus includes: a data processing unit that acquires content codes including a data processing program recorded in an information recording medium and executes data processing according to the content codes; and a memory that stores an apparatus certificate including an apparatus identifier of the information processing apparatus. The data processing unit is configured to execute an apparatus checking process applying the apparatus certificate stored in the memory on the basis of a code for apparatus checking process included in the content codes, acquire the apparatus identifier recorded in the apparatus certificate after the apparatus checking process, and execute data processing applying content codes corresponding to the acquired apparatus identifier.
    Type: Application
    Filed: January 25, 2007
    Publication date: August 9, 2007
    Applicant: Sony Corporation
    Inventor: Yoshikazu Takashima
  • Patent number: 7228155
    Abstract: The present invention relates to a process for providing a RF module configured to convert a nontraditional transaction device for traditional transaction completion. The RF module is placed in physical and logical communication with a microprocessor of a nontraditional transaction device for receiving a personalization file to enable the RF module to complete RF transactions. In an exemplary embodiment, the microprocessor is configured to receive the personalization file from a mobile device account provider subsequent to an end user establishing communication with the device account provider and notifying the provider that a RF module is to be personalized. The mobile device account provider may receive the personalization file from a RF module account issuer and provide the personalization file to the RF module via the mobile device microprocessor.
    Type: Grant
    Filed: October 15, 2004
    Date of Patent: June 5, 2007
    Assignee: American Express Travel Related Services Company, Inc.
    Inventor: Peter D. Saunders
  • Patent number: 7222240
    Abstract: A “dual” personal key/token is disclosed. The “dual” personal key is useful for installing drivers and other command interfaces which allow the personal key to be coupled to and used with a host computer. In a first embodiment, the personal key operates as a USB hub, and reports two devices, a storage device and a personal key, to the host computer. In a second embodiment presents a single device, and different portions of the personal key are activated as required.
    Type: Grant
    Filed: November 6, 2002
    Date of Patent: May 22, 2007
    Assignee: Safenet, Inc.
    Inventor: Laszlo Elteto
  • Patent number: 7216231
    Abstract: A method of establishing a secure communications link between a user communications device and a first service communications device; the method comprises the steps of initiating a communications link using a first communications protocol between the user communications device and the first service communications device; performing, based on a PIN value, an initialisation procedure between the user communications device and the first service communications device, the initialisation procedure resulting in an identification key; storing the identification key in the user communications device and the first service communications device; the method is characterised in that it further comprises the steps of using a second communications protocol to perform a transaction between the user communications device and a second service communications device; generating and storing the PIN value; the invention further relates to a communications system and a mobile communications device.
    Type: Grant
    Filed: February 7, 2002
    Date of Patent: May 8, 2007
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventor: Christian Gehrmann
  • Patent number: 7207060
    Abstract: Method, system and computer program product for secure ticketing in a communications device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write security element to securely transmit and store critical data utilized by users of a communications device. Using the present invention, third-parties can prevent the fraudulent use of third-party services without detection.
    Type: Grant
    Filed: January 22, 2002
    Date of Patent: April 17, 2007
    Assignee: Nokia Corporation
    Inventors: Olli Immonen, Nadarajah Asokan, Panu S. Markkanen
  • Patent number: 7206936
    Abstract: A method and computer program to revoke and update a token (130) having several encryption, signature and role certificates/private keys contained in the token (130). The certificates/private keys in the token 130 are transmitted wrapped by a public key and may only be activated by a private key contained in the token (130). The activation of any certificate/private key requires the entry of a passphrase by a user (132). Further, all certificates/private keys contained in a token (130) are stored in an authoritative database 104. In the event that a token (130) is lost then all certificates/private keys associated with the token (130) are revoked. Further, when new certificates/private keys are issued to a user (132) these certificates/private keys are encrypted using the token's (130) public key and downloaded to the token (130).
    Type: Grant
    Filed: December 19, 2001
    Date of Patent: April 17, 2007
    Assignee: Northrop Grumman Corporation
    Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
  • Patent number: 7197639
    Abstract: This invention relates to cryptographic communications methods and systems that protect a server from a connection depletion attack. Specifically, the invention presents a method for allocating a resource comprising the steps of receiving a resource allocation request from a client, imposing a computational task and a time limit for correct completion of the task upon the client, verifying that the task was performed correctly within the time limit, and allocating the resource if the task was correctly performed within the time limit.
    Type: Grant
    Filed: February 2, 2000
    Date of Patent: March 27, 2007
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, John Brainard
  • Patent number: 7194759
    Abstract: A trusted co-server, and a method of using a trusted co-server, for a service provider. The co-server executes a program such that: for multiple parties P0–Pn (where Po is said co-server), each party Pi may (optionally) provide input Ii, and then said co-server carries out N functions: Fi (io . . . In) describes what the co-server returns to party Pi. The preferred embodiment of the invention raises the trust level of the computation and data storage at the server. For instance, this invention may be witness to authenticity of certain data coming back to the client. This data can include assertions from the trusted co-server about the server content and configuration. The invention, also, can provide privacy of data going back to the server, by keeping it encrypted between the client and the co-server, and then re-encrypting it before inserting it into the server.
    Type: Grant
    Filed: September 15, 2000
    Date of Patent: March 20, 2007
    Assignee: International Business Machines Corporation
    Inventors: David M. Chess, Joan Dyer, Naomaru Itoi, Jeff Kravitz, Elaine Rivette Palmer, Ronald Perez, Sean William Smith
  • Patent number: 7176849
    Abstract: An apparatus and technique for allowing wireless electronic badges to temporarily establish a wireless network (e.g., a piconet network) with a network security station mounted in a facility of an employer, a gym, a membership club, etc. The wireless electronic badges automatically exchange user code with the network security station, and receives relevant badge information for display and use by that particular secured facility. In a preferred embodiment, BLUETOOTH technology is used in the wireless piconet front ends of the electronic wireless badge and the network security station. The disclosed electronic wireless badge includes an LCD display, a display controller, an information exchange module, and a wireless front end (e.g., a wireless piconet network such as a BLUETOOTH network). The electronic wireless badge includes a unique user code which is passed to the network security station.
    Type: Grant
    Filed: August 15, 2000
    Date of Patent: February 13, 2007
    Assignee: Agere Systems Inc.
    Inventors: Philip D. Mooney, Jian Wu
  • Patent number: 7134145
    Abstract: In a limited-copy protection scheme, a check-out/check-in system is configured to a) verify that the receiving device is a certified conforming device, and b) verify that the device that checks-in content material is the same device that checked-out the content material. The verification of the receiving device is effected via a conventional certification process. The verification that the same device is used for check-in and check-out is effected via a secure challenge-response protocol. As contrast to a conventional contemporaneous challenge-response protocol, the system provides a challenge that is specific to the receiving device when the content material is checked-out, and verifies the appropriate response when the content material is checked-in. Because the challenge-response is specific to the receiving device, only the device that receives the challenge when the content material is checked-out can provide the appropriate response when the content material is checked-in.
    Type: Grant
    Filed: April 13, 2000
    Date of Patent: November 7, 2006
    Assignee: Koninklijke Philips Electronics N.V.
    Inventor: Michael A. Epstein
  • Patent number: 7131007
    Abstract: A system and method of retrieving a watermark in a watermarked signal are disclosed. The watermarked signal comprises odd and even overlapped blocks where the watermark is contained in the even blocks. The method comprises, for each k-th even block, subtracting the two adjacent odd blocks from the k-th even block of the watermarked signal to retrieve {overscore (s)}*k(n), transforming {overscore (s)}*k(n) into the frequency domain to generate {overscore (S)}k(f), calculating a phase of {overscore (S)}k(f) as {overscore (?)}(f) and a phase of Sk(f) as ?(f), calculating the difference ?(f) between {overscore (?)}(f) and ?(f), unwrapping ?(f) to obtain the phase modulation {tilde over (?)}k(f), and using a Viterbi search to retrieve the watermark embedded in {tilde over (?)}k(f).
    Type: Grant
    Filed: March 26, 2002
    Date of Patent: October 31, 2006
    Assignee: AT & T Corp.
    Inventors: James David Johnston, Shyh-Shiaw Kuo, Schuyler Reynier Quackenbush, William Turin
  • Patent number: 7123717
    Abstract: A countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm. A first countermeasure method uses a random calculation for each new execution of the decryption algorithm with CRT. The calculations are made modulo p*r and q*t, r and t being random numbers. A second countermeasure makes the recombination random using the CRT theorem.
    Type: Grant
    Filed: October 13, 2000
    Date of Patent: October 17, 2006
    Assignee: Gemplus
    Inventors: Jean-Sebastien Coron, Pascal Paillier
  • Patent number: 7114075
    Abstract: Apparatus of the present invention comprises a control unit controlling comparison of identifying information input by a user with identifying information stored in a storage medium, which also stores authentication information for applications corresponding to the stored identifying information. The apparatus also comprises a set unit setting, as input information for authentication system of one of the applications, the authentication information the storage medium sends to the set unit responsive to a result of the comparison.
    Type: Grant
    Filed: April 4, 2000
    Date of Patent: September 26, 2006
    Assignee: Fujitsu Limited
    Inventors: Hideto Yasuda, Tomohito Osawa
  • Patent number: 7099474
    Abstract: A key and lock device comprises a key having a first electronic circuit and a lock having a second electronic circuit. The key and the lock store secret information, some of which is unique for each device. The key and the lock exchange a random number through connectors and perform a calculation in the respective circuitry based on the random number and secret information. An electrical blocking mechanism is moved to a non-blocking position if a comparison of the calculations in the circuits gives the correct result.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: August 29, 2006
    Assignee: Assa Abby AB
    Inventors: Inge Lidén, Rolf Norberg, Björn Magnusson, Johan Warnström, Reijo Hakkarainen, Hannu Sivonen, Gudrun Brennecke, Christophe Chanel, Jens Gürtler, Jürgen Krühn, Alain Varenne, J M Thomas, Lance Schoell, Gilbert Andre, Christian Darmanin, Arnaud Lefebvre, Walter Hammer, Claude-Eric Jaquet, Nicolas Peguiron
  • Patent number: 7073069
    Abstract: A digital logic circuit comprises a programmable logic device and a programmable security circuit. The programmable security circuit stores a set of authorized configuration security keys. The programmable security circuit compares the authorized configuration security keys with an incoming configuration request, and selectively enables a new configuration for the programmable logic device in response to the configuration request. In another exemplary embodiment, a programmable security circuit also stores a set of authorized operation security keys. The programmable security circuit compares the authorized operation security keys with an incoming operation request from the programmable logic device, and selectively enables an operation within the programmable logic device in response to the operation request.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: July 4, 2006
    Assignee: Infineon Technologies AG
    Inventors: Stephen L. Wasson, David K. Varn, John D. Ralston
  • Patent number: 7058804
    Abstract: A data storing system is provided, wherein the data storing system includes: a user apparatus; an issuing apparatus which issues a registration certificate; a data providing apparatus; an issuer registration apparatus; and a data registration apparatus; wherein the user apparatus includes: a part which generates registration information on a key including a user public key, sends the registration information to the issuing apparatus with user information; and a part which verifies a registration certificate, received from the issuing apparatus, which is signature information of the issuer for the registration information and the user information, stores the registration certificate to a storage device when the registration certificate is verified; wherein the issuing apparatus includes a part which generates the registration certificate and sends the registration certificate to the user apparatus.
    Type: Grant
    Filed: August 29, 2000
    Date of Patent: June 6, 2006
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Hideki Akashika, Shinichi Hirata, Nagaaki Ohyama, Akio Kokubu
  • Patent number: 7055033
    Abstract: Various embodiments pertain to an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for steganographically authenticating identities and authorizing transactions based on the authenticated identities.
    Type: Grant
    Filed: May 21, 2004
    Date of Patent: May 30, 2006
    Assignee: Microsoft Corporation
    Inventor: Scott B. Guthery
  • Patent number: 7047409
    Abstract: A method of automatically tracking a certificate pedigree is provided, in which a new user is provided with a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust bearing a relationship to a category of hardware of which the provided piece of hardware is a member. An automated registration arrangement is provided which can be accessed only by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein. When the new user accesses the automated registration arrangement using the provided piece of hardware, the automated registration arrangement provides the new user with an individual signature certificate having a level of trust commensurate with that of the pedigree certificate.
    Type: Grant
    Filed: October 16, 2000
    Date of Patent: May 16, 2006
    Assignee: Northrop Grumman Corporation
    Inventors: Kenneth W. Aull, Vincent J. McCullough
  • Patent number: 7039808
    Abstract: Method for checking the signature of a message, the message, signature, and a certificate having been sent by a signer having a public key to a recipient having a message storage device.
    Type: Grant
    Filed: March 17, 2000
    Date of Patent: May 2, 2006
    Assignee: Axalto SA
    Inventor: Arnaud Fausse
  • Patent number: 7028186
    Abstract: The security keys in the mobile terminals and access points of a wireless local area network (WLAN) are created, utilized and managed for a communication session between a mobile terminal and access point. Both the WLAN link level security protection and IP security functions of the network use the same Internet Key Exchange (IKE) key management protocol and use certificates in the same certificate hierarchy. When the mobile terminals associates with the network, it uses the IKE protocol with private keys and certificates to generate WLAN link level keys with the access point and provide mutual authentication.
    Type: Grant
    Filed: February 11, 2000
    Date of Patent: April 11, 2006
    Assignee: Nokia, Inc.
    Inventors: Jorma Stenman, Harri Hansen, Juha Salvela
  • Patent number: 7027880
    Abstract: Re-certification of a control program loaded in a safety controller is avoided through the use of a digital snapshot and digital signature, the snapshot providing a rapidly loadable memory image file and the signature providing a confirmation that the file loaded matches a previously certified copy so as to avoid the need for time consuming re-certification.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: April 11, 2006
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Joseph Paul Izzo, Norman Sievert Shelvik, Michael Dean Kalan, Charles Martin Rischar, Raymond Louis Buvel
  • Patent number: 6996722
    Abstract: In a data communications system a remote data source outputs data as a series of application data units (ADUs). Each ADU is individually encrypted with a different key. The keys are transmitted (for example using Internet multicasting) via a communications network to one or more customer terminals. At the terminals a sequence of keys is generated for use in decrypting the ADUs. A record is kept of the keys generated, and this record may subsequently be used to generate a receipt for the data received by the customer. The keys may be generated, and the record stored within a secure module such as a smartcard.
    Type: Grant
    Filed: December 15, 1998
    Date of Patent: February 7, 2006
    Assignee: British Telecommunications public limited company
    Inventors: Ian R Fairman, Robert J Briscoe
  • Patent number: 6990579
    Abstract: In one embodiment, a method of remote attestation for a special mode of operation. The method comprises storing an audit log within protected memory of a platform. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: January 24, 2006
    Assignee: Intel Corporation
    Inventors: Howard C. Herbert, David W. Grawrock, Carl M. Ellison, Roger A. Golliver, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger, Ken Reneris, James A. Sutton, Shreekant S. Thakkar, Millind Mittal
  • Patent number: 6981148
    Abstract: A verification method and system including a verifier which can both interpret policies and determine if they are satisfied, and request and obtain relevant certificates. This new architecture includes a verifier which itself can both direct a retrieval mechanism and use a local database of information. Users and applications can obtain and supply certificates to the verifier and the local database. The verifier may invoke a retrieval mechanism to obtain necessary certificates from other authenticated data servers and store them in a secondary database. The flexibility to allow for both on-line and off-line authenticated data server responses for verification is encompassed, as is an enhanced system for security including revocation of certificates using a polarity discipline, which allows data used for revocation to be handled with the same system used for other verification data without imperiling security.
    Type: Grant
    Filed: April 29, 2000
    Date of Patent: December 27, 2005
    Assignee: University of Pennsylvania
    Inventors: Trevor Jim, Carl A. Gunter
  • Patent number: 6981147
    Abstract: A method for creating, storing and reading a new certificate type for certification of keys is provided. In the new certificate type, several certificates, containing a minimum quantity of redundant data fields, are collated to form one certificate and all redundant information on the certificates is eliminated. An embodiment of the new certificate type is the group certificate. The group certificate is used where several keys are to be issued at the same time for the same user by the same certification instance. By means of the group certificate, all redundant data elements are eliminated and all data elements for a set of several keys subject to certification are grouped into one certificate. This substantially reduces the memory requirement, and handling of the certificates is simplified for the communication partners. A further embodiment of the new certificate type is the basic and supplementary certificate combination.
    Type: Grant
    Filed: January 14, 2000
    Date of Patent: December 27, 2005
    Assignee: International Business Machines Corporation
    Inventors: Ernst-Michael Hamann, Jutta Kreyss, Narayanan Vasudevan
  • Patent number: 6980660
    Abstract: A method and system for enabling wireless devices distributed throughout an enterprise to be efficiently initialized for secure communications. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and initialize the wireless devices.
    Type: Grant
    Filed: May 21, 1999
    Date of Patent: December 27, 2005
    Assignee: International Business Machines Corporation
    Inventors: John Raithel Hind, Marcia Lambert Peters
  • Patent number: 6973191
    Abstract: A data processing method and system for generating a unique symmetric key inside a PSD having limited trust relationships between PSD manufacture, PSD issuer, subsequent service providers and a trusted third party.
    Type: Grant
    Filed: November 2, 2001
    Date of Patent: December 6, 2005
    Assignee: Activcard
    Inventors: Yves Louis Gabriel Audebert, Eric F. Le Saint
  • Patent number: 6954855
    Abstract: Various embodiments pertain to an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for steganographically authenticating identities and authorizing transactions based on the authenticated identities.
    Type: Grant
    Filed: December 23, 2004
    Date of Patent: October 11, 2005
    Assignee: Microsoft Corporation
    Inventor: Scott B. Guthery
  • Patent number: 6950941
    Abstract: Systems connected to users generate a plurality of keys which are mutually shared, and download and upload digital contents by using secret channels formed between the systems. An information provider receives an authorization from a certificate authority. A licensed SDMI compliant module (LCM) is authenticated through the information provider, and the information provider and the LCM form a channel. A portable device is authenticated from the information provider through the LCM, and the LCM and the portable device form a channel. The digital content between the LCM and the portable device is downloaded and uploaded according to respective control state data of the LCM and the portable device. The system can use a physical address of a bad sector formed in the portable medium during the manufacturing process for preventing an illegal copy of the downloaded digital contents through the portable device after the digital contents have been downloaded.
    Type: Grant
    Filed: April 30, 1999
    Date of Patent: September 27, 2005
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Chang-Hyi Lee, Ho-Suk Chung, Eun-Seong Kang
  • Patent number: 6934840
    Abstract: An apparatus and method for managing keystores is implemented. A distributed keystore is established by aggregating individual. The distributed keystore may, be organized in a multi-level structure, which may be associated with an organizational structure of an enterprise, or other predetermined partitioning. Additionally, a centralized management of certificates may be provided, whereby the expiration or revocation of the certificates may be tracked, and expired or revoked certificates may be refreshed. The keystore may be updated in response to one or more update events.
    Type: Grant
    Filed: December 21, 2000
    Date of Patent: August 23, 2005
    Assignee: International Business Machines Corporation
    Inventors: Bruce Arland Rich, Julianne Yarsa, Theodore Jack London Shrader, Donna Skibbie
  • Patent number: 6925560
    Abstract: Prior to the execution of a program contained in a second chip card inserted in a terminal such as a mobile radio telephone terminal, in addition to a first chip card containing data and connected to a telecommunication network to which the terminal is linked, one of the cards is authenticated by the other, or the two cards are authenticated mutually. This double authentication ensures the authenticity of the program for its overall execution in the terminal and the origin of the second card, distributed through conventional channels, for the network operator.
    Type: Grant
    Filed: June 5, 2000
    Date of Patent: August 2, 2005
    Assignee: Gemplus
    Inventor: Bruno Basquin